Additional Content

Malicious Mobile Apps (MMA) — A Growing Threat in 2013 and BeyondWith the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs.

Below are some key highlights:

73% of IT pros expect mobile threats to their networks will increase in the next 12 months

Web Threats Expose Businesses to Data LossWebroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012.

The survey report also includes recommendations—such as deploying a secure web gateway—for responding to this new threat environment.

Key findings include:

8 in10 companies experienced web-borne attacks in 2012

The majority of respondents reported significant impacts such as increased help desk time, reduced employee productivity and disruption of business activities

Secure web gateways are a critical component of an effective defense against web-borne threats

The Wild, Wild West of Mobile AppsThis whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate

security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild:

Web Threats — Is Your Company Exposed?This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help

desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points:

Below are some key highlights:

Phishing is the most prevalent web-borne cyber attack

8 in 10 companies experienced one or more types of web-borne attacks in 2012

Reinventing AntivirusThis white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making

it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with:

Cloud/client architecture

Journaling and rollback

Behavioral recognition of malware
These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.

Mobile Browsing — Is Your Company at Risk?This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data.

And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks.

Among the key points:

50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012.

90% of respondents agree that managing the security of remote users is challenging

Remote Users Expose Companies to CybercrimeWebroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities.

The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones.

90% of companies agree that managing the security of remote users is extremely challenging

Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data

These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware.

Learn more about:

Uncovering phishing emails and phishing websites in real time

Limiting the amount of personal information employees expose on social media sites

Putting Web Threat Protection and Content Filtering in the CloudThis Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based

secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as:

Better defense against zero-day threats and spam servers

More comprehensive signature and URL database

Supports remote users more securely and without the cost of putting servers in every location

From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with:

PassMark Ranks Leading Endpoint Protection ProductsIn today's challenging security environment, using the best products that fulfill your business needs is of the essence. So when evaluating solutions, be sure to look at all aspects of a product—including performance benchmark testing.

PassMark Software is a leading authority in software and hardware performance benchmarking, providing independent testing and analysis. In this recent PassMark report, discover how eight different endpoint security software products compare on a variety of metrics—from performance to malware protection—to help you determine which would work best in your organization.

Faster Scans and Better Virus Detection—Can They Do That? This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today's more than 70 million malware variants.

It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as:

System Analyzer Webroot® System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS and installed applications—in less than 2 minutes. You can run this free tool at any time to assess the health and security status of the PCs in your environment.